|
Security techniques | Key strength | Weakness |
|
Secure keyboard program | Prevents exposure of important information input from users | It is difficult to implement and has race condition between attacker and defender |
|
PKI applications | Prevents the exposure of important information transmitted to the network domain | Requires PKI module implementation and deployment costs |
|
E2E encryption | Prevents the exposure of important information transmitted from the user terminal domain to the financial institution domain | Requires E2E module implementation and deployment costs |
|
Antihacking program | Protects the system by preventing and detecting attacks from the outside in the user terminal domain | It is impossible to completely protect the system, and it is difficult to detect unknown attacks, due to various system attacks |
|
Personal firewall | Protects the system by detecting and blocking malicious packets in the network domain | It is impossible to completely protect the system, and it is difficult to detect unknown attacks, due to the variety of network attacks |
|
Removable media security | Enhances the security of user authentication by protecting personal and confidential information such as certificates stored on removable media | It is difficult to completely protect stored important information by bypassing authentication and exposing the cryptography key, due to various vulnerabilities |
|
Antireverse engineering technique | Protects program code by making it difficult for attackers to analyze the program and taking a long time for analysis | It is difficult to completely protect the analysis of the program code; finally, there is a drawback and weakness in that it can be analyzed, even if it takes a long time |
|